I am surprised. No, I didnât suppose editing .desktop Exec= files would be required. It looked plausible to me that replacing pkexec with lxqt-sudo should fix all applications which use Exec= pkexec (already default, no user modification) something or within their wrapper script.
@Patrick No, my .desktop mod only has to apply to KDE Partition Manager. (Iâve needed to do it ever since moving to XFCE from KDE Whonix. To me it is superior to / easier to use than GParted, even though it comes from KDE.) I just mentioned that detail to be more complete. Also, for what itâs worth, your previous instructions were incompatible with my own fix for Thunar disk mounting (UDisks2 .policy file).
Iâll have to try your corrected instructions another time soon, will report back.
I am also experiencing issues starting Zulucrypt (the only application so far for me) with the error relating to pkexec. I applied the (edited) fix posted above, and the application starts, but exits with âunknown error status 255â when I try to mount a volume (in a file) previously created and opened using Zulucrypt in Whonix before the problem manifested. It might not be related (though it is curious timing if not), but wanted to convey my experience. Thanks for working on a solution.
Disabling proc-hidepid.service actually does work for me. It didnât before for some reason (probably because I still had the /sys restrictions enabled).
Hardening - Debian Wiki talks about polkit dropping privileges and needing an exception although there isnât a polkitd user.
I only managed to fix pkexec by allowing the user user unrestricted access to /proc. This means polkitd drops privileges to the current running user instead of any special polkit user. We should make a bug report and try to make them bring back the polkitd user.
I even went into its configuration to tick to auto mount hotplugged and inserted external drives.
ButâŚstill doesnât work. I click on my drive under Devices in Thunar, nothing happens. In my main Whonix, my own insecure hacky fix continues to work.
Hope that helps. The above newer posts sound promising.
Hello. I read the comment in this thread that my specific issue with Zulucrypt throwing an error are probably unrelated to the subject of this thread.
That said, I wanted to offer some anecdotal details from my experience since the last time I posted a comment on this thread.
If it would be better to open a new thread about this, I will gladly do so.
Steps in this process:
(1) Everything is working properly in my instance of Whonix.
(2) Update/upgrade Whonix to Debian 10/Buster base as instructed.
(3) After reboot, I first got the error regarding âpkexecâ, and found this thread. (The only app I used that this affected was Zulucrypt.)
(4) Applied the posted/possible workaround, and was able to start Zulucrypt but not able to open an encrypted volume that had worked fine before upgrade/update to Debian 10/Buster base. Thatâs the error I had posted about previously that might be unrelated to the âpkexecâ error.
Since then:
(5) I opened the original instance of Whonix VMâs (from which this instance was cloned back in July). I went through the exact steps of updating/upgrading as above and duplicated every one of the steps with exactly the same results.
(6) I installed âgnome-disk-utilityâ which has the ability to attach and open LUKS-encrypted images/volumes. It attached okay, but upon attempting to decrypt it, it throws this error upon failure:
âerror unlocking /dev/loop0: The function âbd_crytpo_luks_open_blobâ called but not implemented1 (udisks-error-quark; 0)â
Conclusion: I will gladly post this as a new thread if advisable; it is possible that the error involving âpkexecâ and this problem of decrypting a previously created LUKS volume are separate issues. The certain overlap is that both manifestations began occurring at the time of updating/upgrading the existing Whonix instance to the Debian 10/Buster base.